{"title":"智慧城市自动驾驶汽车信息威胁估计方法","authors":"V. Promyslov, K. Semenkov","doi":"10.1109/ICIEAM48468.2020.9111871","DOIUrl":null,"url":null,"abstract":"The application of formal security models in the frame of a discretional security model to the problem of secure control of an autonomous vehicle in a smart city environment is considered. Modified information transfer relations and mapping of communication channels between an autonomous vehicle and other assets are presented. A characteristic of asset deviation that allows total security graph mapping to an effective local security graph is defined. The asset deviation takes into account both physical path length and “information distance” between the assets. An approach for the calculation of asset deviation is presented. A practical example of a cybersecurity architecture analysis of asset integrity for a system of autonomous vehicles in a smart enterprise environment is provided.","PeriodicalId":285590,"journal":{"name":"2020 International Conference on Industrial Engineering, Applications and Manufacturing (ICIEAM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Method of Estimating Information Threat for Autonomous Vehicles in Smart City\",\"authors\":\"V. Promyslov, K. Semenkov\",\"doi\":\"10.1109/ICIEAM48468.2020.9111871\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The application of formal security models in the frame of a discretional security model to the problem of secure control of an autonomous vehicle in a smart city environment is considered. Modified information transfer relations and mapping of communication channels between an autonomous vehicle and other assets are presented. A characteristic of asset deviation that allows total security graph mapping to an effective local security graph is defined. The asset deviation takes into account both physical path length and “information distance” between the assets. An approach for the calculation of asset deviation is presented. A practical example of a cybersecurity architecture analysis of asset integrity for a system of autonomous vehicles in a smart enterprise environment is provided.\",\"PeriodicalId\":285590,\"journal\":{\"name\":\"2020 International Conference on Industrial Engineering, Applications and Manufacturing (ICIEAM)\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 International Conference on Industrial Engineering, Applications and Manufacturing (ICIEAM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICIEAM48468.2020.9111871\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Conference on Industrial Engineering, Applications and Manufacturing (ICIEAM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIEAM48468.2020.9111871","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Method of Estimating Information Threat for Autonomous Vehicles in Smart City
The application of formal security models in the frame of a discretional security model to the problem of secure control of an autonomous vehicle in a smart city environment is considered. Modified information transfer relations and mapping of communication channels between an autonomous vehicle and other assets are presented. A characteristic of asset deviation that allows total security graph mapping to an effective local security graph is defined. The asset deviation takes into account both physical path length and “information distance” between the assets. An approach for the calculation of asset deviation is presented. A practical example of a cybersecurity architecture analysis of asset integrity for a system of autonomous vehicles in a smart enterprise environment is provided.